ABOUT US SERVICES FEATURED ARTICLES CONTACT US SITE MAP
 


Vulnerabilities Analysis

This OCP module is designed to identify and raise the awareness of potential vulnerabilities, loopholes and weak links that exist in the client's operating environment so as to avoid costly and irreversible errors that would otherwise become apparent only when the undesired event occurs and the disaster plan and recovery strategy are implemented.

Vulnerabilities or seeds of disaster are generally apparent and readily visible but often overlooked and neglected. They generally embody an unnecessarily high risk of susceptibility to impact. But on a positive note, vulnerabilities can be reduced with relatively small investment of money, time and effort.

Arresting the potential vulnerabilities, loopholes and weak links that exist in the client's operating environment before they become costly and irreversible errors minimizes the level of risk exposure of the client to an acceptable level and enhances the overall corporate's confidence level that all reasonable and practicable steps have been taken to ensure the smooth operations of the business. It considerably increases the probability that the company will be out of harm's way whenever an undesirable event occurs.

Vulnerabilities identification is the quest for at-risk conditions, hence honesty and thoroughness are two important criteria in exposing vulnerabilities in the company.

In general, there are three kinds of vulnerabilities. Firstly, vulnerabilities that place the company at an exceedingly or excessively high level of risk and they warrant rectification without any delay. Secondly, vulnerabilities that unnecessarily places the company at a level of risk higher than the acceptable level. Lastly, apparent vulnerabilities that will be discovered and when analyzed, turned out to be at a level of risk so low that rectification is not deemed necessary or that the cost of rectification to lower the level of risk is excessive in terms of the ultimately achieved risk level.

In conclusion, the lesser vulnerabilities present in the client's operating environment, the lower the risk exposure it faces.






 


ALSO IN THIS SECTION
   
Overview
   
Risk Management
 
> Risk Assessment
> Vulnerabilities Analysis
> Business Impact Analysis
> Risk Mitigation
   
IT Contingency
Planning
   
IT Disaster Recovery
Planning
   
Office Relocation
Planning
   
Standard Operating
Procedures
   
Documentation


Copyright 2005 All rights reserved.